Download presentation
Presentation is loading. Please wait.
Published byJessie Pierce Modified over 9 years ago
1
Aïda Michlowski, PhD, JD Terror by Technology
2
Inappropriate content Inappropriate contact Inappropriate conduct What is cyberbullying?
3
How does cyberbullying differ from physical (F2F) bullying?
4
What are the methods of cyberbullying? Stealing passwords Malicious code Internet polling Interactive gaming Sending porn Mass emails Impersonating Text attack Blogging Textual harassment
5
Where does occur?
6
Who are the perpetrators & the victims? Megan Meier Anthony Stand Top 6 Ways to Kill Piper
7
What are the warning signs? Stop,Block,Tell! Keep safe, Keep away, Keep telling!
8
How do we deal with cyberbullying? ID the Creep Take 5 Keep current, Keep checking, Keep communicating
9
Think before you click!
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.